U2.1 Cables, Hubs, Sniffers

Mind Map by , created over 5 years ago

Nework Security Mind Map on U2.1 Cables, Hubs, Sniffers, created by jjanesko on 04/07/2014.

Created by jjanesko over 5 years ago
U2.1 Cables, Hubs, Sniffers - Hub Diagram
U2.5 SNMPv1 - SNMPv1 protocol stack
U2.3 TCP, Routers - Router Diagram
Ionic Bonding
Evangeline Taylor
Unit 5: Nuclear and Thermal Physics
Michael Priest
U2.6 SNMPv3
U2.4 LANs, MANs, WANs
U2.5 SNMPv1
U2.1 Cables,Hubs,Sniffers- Thin Ethernet
U2.3 TCP, Routers, VLAN
U2.1 Cables, Hubs, Sniffers
1 Protocol for Ethernet
1.1.1 Carrier Sense before sending, device checks to see if there is another device using network, if yes, it waits
1.1.2 multiple access any device can use network when it is free
1.1.3 collision detection after detecting collision, wait a random delay if collision detected again, wait 2x as long and check (called "expontential backoff")
2 cabling
2.1 thick ethernet
2.1.1 10BASE 5, 10 Mbps, 500m
2.2 thin ethernet
2.2.1 10BASE2, 10Mbps, 200m
2.3 unshielded twisted pair
2.3.1 10BASE-T, 100-BASE -T, T=twisted pair Cat 1 telephone Cat 3, 10Mbps Cat 5, 100Mbps Cat5e, 1000Mbps
2.4 shielded twisted pair
2.4.1 Used for token ring, good for high interference
2.5 fibre-optic
2.5.1 1000 Mbps or higher
2.6 wireless LAN
2.6.1 Not type of cabling, but often used instead of. 11-150Mbps
2.7 OSI layer 1
2.8 4 fundamental threats
2.8.1 information leakage
2.8.2 integrity violation
2.8.3 denial of service
2.8.4 illegitimate use
2.8.5 safeguards run cable through protective trunking lockable, dedicated network closets add electromagnetic shielding to cabling run cabling through trunking with pressurized gas, have alarms for pressure loss
3 hubs
3.1 types
3.1.1 dumb
3.1.2 intelligent regenerate signals for long network cables monitor congestion, send alarms remote monitoring
3.2 switched network (see note)


4 network interface card (NIC)
4.1 listening modes
4.1.1 non-promiscuous only listens to traffic targeted for that device
4.1.2 promiscuous listens to all traffice on the network
4.2 Physical interface that allows a device to listen to network traffice
5 sniffer
5.1 device listening to all traffic on a network
5.2 detection
5.2.1 method 1 1.send large volume of packets to non-existing network address 2. send an ICMP request to suspect device. If device is sniffing, it will be overwhelmed.
5.2.2 method 2 1. Send packet to unused IP address on network 2. Sniff network to see if any devices try to resolve DNS name
6 examples
6.1 thin ethernet
6.1.1 coaxial cable
6.1.2 build network by daisychaining nodes computers connect directly to network cable
6.1.3 vulnerabilities when one cable is damaged, the whole network fails all devices on network receive data easy to attach addtional devices
6.2 10BASE-T
6.2.1 connects devices to network via hub (see note)


6.2.2 vulnerabilities all devices on network receive data (hub broadcasts) easy to attach additional devices

Media attachments